Cybersecurity is by far the biggest threat to businesses worldwide, and the biggest challenge – and opportunity – for integrators and solution providers. The event features a full day of online education, best practices, and training on protecting your clients with profitable security offerings.

Every SMB needs security services, but finding specific SMBs to sell your security services to, and then turning those prospects into customers, isn’t easy. In this webinar, channel guru Erick Simpson, of SPC International, walks you step by step through proven processes you can use to generate security sales leads and convert them into successfully closed deals.

Generating New MRR Offering Turnkey Security and Compliance Services in the Rapidly Growing World of IoT

Hear Steve Rutkovitz, cybersecurity expert and MSSP consultant, use the hot topic of Internet of Things security as the launching point for a detailed discussion on why every security service worth offering must assess customer environments, address outstanding vulnerabilities, and maintain deployed protections.

Opening a security practice can set you up for big profit—or big headaches if you don’t put the right legal protections in place up front. Let attorney and IT legal expert Bradley Gross walk you through the essential contracts and clauses no security service provider can afford to be without.

Take a tour of the biggest revenue-generating opportunities in security today with the help of three leading minds from top security vendors: David Bennett of Webroot, William Malik of Trend Micro, and Win Pham of RapidFire Tools.

Every channel pro needs security expertise today, but few can afford the enormous salaries that experienced security experts command. Join IT hiring expert Wayne Rampey, of VAR Staffing, for a look at inside secrets you can use to get the security talent you need affordably by finding, hiring, and training people with interests, skills, and abilities that will set them—and you—up for success.

Join global cybersecurity strategist Ian Thornton-Trump for an expert overview of today’s ever-expanding attack surface, the impact cloud computing and the Internet of Things are having on security vulnerabilities, and specific ways channel pros can protect their clients and grow their business by delivering cybersecurity services.

Steve Rutkovitz has a unique understanding of the needs within the managed services industry, having spent the last 20 years building and selling companies. He has successfully tapped into the security and compliance market, developing an innovative approach: Assess, Address, Maintain, helping MSPs safeguard their clients. Steve is known throughout the industry as an expert helping MSPs develop strategies that generate new business and increase monthly recurring revenue. Steve is founder and CEO of Choice Cybersecurity, and enables leading MSPs to offer turnkey security and compliance solutions.

Bradley Gross

Bradley Gross is the founder and president of the Law Office of Bradley Gross, P.A. Gross is a world-recognized expert in information technology law, and his law firm specializes in transactions involving MSPs, VARs, OEMs, technology solution resellers, cloud solution providers, IT professionals, and technology and media companies globally. Brad can be reached at brad@bradleygross.com, or at (954) 217-6225.

Erick Simpson, SPC International

Erick Simpson is co-founder, senior vice president, and CIO of SPC International Online, a training and business improvement organization for integrators, MSPs, and IT solution providers. An expert in IT business growth strategy development and execution, and one of the most prolific, recognized, and sought-after IT, cloud, and managed services experts, consultants, authors, and speakers in the industry, Erick is experienced in improving top- and bottom-line business performance by increasing operational efficiencies, boosting marketing and lead-generation outcomes, accelerating sales velocity, shortening sales cycles, and maximizing service delivery efficiencies and M&A outcomes. Learn more at https://consulting.spc-intl.com.

Wayne Rampey, VAR Staffing

Wayne Rampey is the CEO of VAR Staffing, a technology staffing services provider to resellers and MSPs nationwide, and Apollo Staffing, which primarily focuses on the state of Texas. He successfully started two professional services firms, including one that was a $27 million a year business when he sold it, prior to joining Apollo/VAR Staffing. Wayne sits on the board of directors for several technology companies, including the largest technology organization in Texas, and serves on the degree advisory board of Texas Christian University for their Bachelor of Information Systems degree. In his spare time Wayne plays guitar, although his wife accuses him of spending more time collecting guitars than playing them.

Ian Thornton-Trump, CD, CEH, CNDA, CSA+ is an ITIL certified IT professional with over 20 years of experience in IT security and information technology. From 1989 to 1992, Ian served with the Canadian Forces (CF), Military Intelligence Branch; in 2002, he joined the CF Military Police Reserves and retired as a Public Affairs Officer in 2013. In Canada, Octopi Managed Services Inc. delivers managed security services to high profile legal firms and in the UK, Octopi Research Labs Ltd. undertakes security consulting and threat intelligence engagements. As the Cyber Vulnerability and Threat Hunting Team Manager for Ladbrokes Coral Group plc. Ian has an in-depth understanding of the threats, small, medium and enterprise businesses face on a daily basis.

This Expert Guide on Security Tools and Best Practices includes advice on how to properly configure firewalls, how to protect your clients from your own employees, and how to secure network printers. It also examines the benefits of cybersecurity insurance and the impact of new state data breach laws. Plus, we hear from two managed service providers who share their stories about developing security practices.

What You Need to Know: IoT Security

This Expert Guide on IoT Security offers you a cybersecurity checklist, discusses who’s responsible when a rogue IoT device brings down the network, looks at how 5G will impact IoT security, and examines why physical security is a good entry point for your IoT offerings.